ACME policy requirements.
ACME Widgets setup “kiosk” computers in its sales department for customers who are visiting the ACME showroom facilities. These computers need access to the Internet and may be used by visitors (vendors and customers) or by ACME sales people to check inventory and prices.
What Group Policies would ACME Widgets implement differently for these Kiosk computers as compared to rest of ACME computers (i.e., pick a policy setting that would provide necessary security for Kiosk computers, but is different from what the policy would be for the rest of the company)?
For example: You may want to prevent users of Kiosks from changing any of the desktop background or themes. But a similar policy for the rest of ACME computer may not be configured by default.
Project Deliverables
Complete the following project objectives.
For this discussion research 2 Group Polices which should apply to the “kiosks.” For each chosen policy describe the following:
a)Name of the policy. Specify the Group Policy Setting name and path (or location) where this setting can be found in the Group Policy Management tool.
b)Describe what this policy setting would be for all other ACME computers? Specify is Group Policy should be Enabled (E), Disabled (D) or Not configured (N). For Auditing specifies what is audited - No Auditing (N), Success (S), or Failure (F) or Both (B).
c)Describe what this policy setting would be for Kiosk computers? Specify is Group Policy should be Enabled (E), Disabled (D) or Not configured (N). For Auditing specifies what is audited - No Auditing (N), Success (S), or Failure (F) or Both (B).
d)What is the policy scope: User or Computer? Specify if the Group Policy is applied to Computer (C) or User (U) or both (B) settings.
e)Where would you link this policy? Chose one: each Kiosk computer Local Policy (L), Site (S), Domain (D) or OU (O)?
f)How would you use Group Policy inheritance, block and override to make sure that only the Kiosks computers are subject to this policy?
g)Why did you pick this policy? How does it improve security?